Client-side encryption
View article: A Survey on Homomorphic Encryption Schemes
A Survey on Homomorphic Encryption Schemes Open
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive ri…
View article
A systematic review of homomorphic encryption and its contributions in healthcare industry Open
Cloud computing and cloud storage have contributed to a big shift in data processing and its use. Availability and accessibility of resources with the reduction of substantial work is one of the main reasons for the cloud revolution. With …
View article
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things Open
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet of Things (IoT). Attribute-based cryptography is a well-known technology to gua…
View article
Homomorphic Encryption for Security of Cloud Data Open
Cloud computing is a broad and diverse phenomenon. Users are allowed to store large amount of data on cloud storage for future use. The various security issues related to data security, privacy, confidentiality, integrity and authenticatio…
View article
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions Open
Privacy and security are the most important issues to the popularity of cloud computing service. In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (AB…
View article
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud Open
\n With\n the rapid development of cloud computing, an increasing number of individuals\n and organizations are sharing data in the public cloud. To protect the\n privacy of data stored in the cloud, a data owner usually encrypts his data\…
View article
Security Algorithms for Cloud Computing Open
With growing awareness and concerns regards to Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms into data systems and processes. This paper presents a brief overview and comparison of Cr…
View article
A Review on Secure Data Deduplication: Cloud Storage Security Issue Open
Cloud storage service providers caters to the need of organizations and individuals by allowing them to store, transfer and backup their ever-increasing amount of data at low cost along with providing access to the other resources of cloud…
View article
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard Open
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and…
View article
BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing Open
Cloud computing facilitates the storage and management of huge volumes of data. It offers flexibility for retrieving the data anytime and anywhere. In recent years, storing data onto the cloud achieved fame among corporations as well as pr…
View article
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks Open
The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the assistance of cloud computing. The new wave of technology will give rise to new risks to…
View article
Privacy-Preserving Data Processing with Flexible Access Control Open
Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing b…
View article
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography Open
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managin…
View article
Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System Open
People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access policy of data, which is also needed to be stored at cl…
View article
Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment Open
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources that serve IoT …
View article
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms Open
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted dat…
View article
Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage Open
Since Cloud Service Provider is a semi-trusted party in cloud storage, to protect data from being disclosed, users' data are encrypted before being uploaded to a cloud server. Undoubtedly, flexible encrypted data sharing is a very importan…
View article
Multimedia Security Using Encryption: A Survey Open
Considering the current dependency on digital technology in modern society, the protection of multimedia is highly important. Encryption is vital in modern digital communication, ensuring data confidentiality, authentication, integrity, an…
View article
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud Open
Due to the rapid development of new technologies such as cloud computing, Internet of Things (IoT), and mobile Internet, the data volumes are exploding. Particularly, in the industrial field, a large amount of data is generated every day. …
View article
The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR) Open
Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Th…
View article
Homomorphic Encryption Technology for Cloud Computing Open
Four kinds of single homomorphic encryption algorithm were summarized for the advantages of homomorphic encryption technology in the cloud environment. It analyzed the security characteristics of four kinds of encryption algorithms. On the…
View article
Offline privacy preserving proxy re-encryption in mobile cloud computing Open
This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based pro…
View article
Efficient time-oriented latency-based secure data encryption for cloud storage Open
To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based encryption techniques. However,…
View article
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption Open
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiat…
View article
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT Open
The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has generated a new paradigm, Mobile Cloud Computing (MCC). While the benefits of storing and accessing data in the Cloud are well documented there a…
View article
Hadoop-based secure storage solution for big data in cloud computing environment Open
In order to address the problems of the single encryption algorithm, such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment, we propose a Hadoop based big …
View article
SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions Open
S.1483-1496
View article
Applying Encryption Algorithm for Data Security in Cloud Storage Open
This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.
View article
The lord of the shares Open
Secure cloud storage is considered one of the most important issues that both businesses and end-users are considering before moving their private data to the cloud. Lately, we have seen some interesting approaches that are based either on…
View article
Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage Open
In attribute-based searchable encryption (ABSE) scheme, data owners can encrypt their data with access policy for security consideration, and encrypt keywords to obtain keyword index for privacy keyword search, and data users can search in…